Computer Architecture
Computer Architecture
Computer Architecture
EEE CSE
ICT ECE
©
100 DAYS
CHALLENGE
TEAM
SE ETE
IT CS
Computer Architecture
Generations of Computers
Type of Computer
Enterprise Computing
Data Center
Cloud Computing
Virtual Machine
Server and Work Station
Computer Architecture
Architectural Unit
System Bus
Computer Performance
Performance Calculation Problems
§ Introduction
§ Features of Memory
§ Classification of Memory
§ Primary or Main Memory
§ Secondary Memory
§ Cache Register
§ Related Math Problem
আমাজির সমসযা
সাকুী োর আজস, চজে োয় রকন্তু কারষিে েে রমজে না। এর রপছজন রকছু কারণ আমরা প্রার্রমক ভাজে
রচরিে কজররছ । প্রর্মে এক্সাম যেি পরজে প্রস্তুরে যনওয়া শুরু করা এিা আমাজির একটি েড় প্রেজেম।
আমাজির ২য় সেজচজয় েড় সমসযা হয় পারজেক্ট ররজসাসী না পাওয়া । এর পজর যে সমসযা গুজো আজস
যসগুজো হজো রপ্রপাজরিন প্লান, স্ট্রাটিরে, রররভিন, িাইম মযাজনেজমন্ি ইেযারি।
“The first step in solving a problem is admitting there is a problem to be solved.”— Pete Seeger
সমসযা সমাধান
সাকুী োর যেসে রপ্রপাজরিন না রনজয় সকে CSE/IT েে এর েনয একটি সেীেনথন রপ্রপাজরিন আমাজির
১ম সমসযা যর্জক মুক্ত করজে। পরথিার রপ্রপাজরিজনর েনয পাজেী ক্ট ররজসাসী এর েজিয আমরা যচষ্টা
কররছ একটি রপ্ররময়াম ররজসাসী যসি তেরর করার। আমরা রেশ্বাস করর এই ররজসাসী োোজর প্রচরেে যেজকান
েই/ররজসাসী যর্জক যসরা হজে। একটি পাজেী ক্ট ররজসাসী আমাজির োরক সকে সমসযা রপ্রপাজরিন প্লান,
স্ট্রাটিরে, রররভিন, িাইম মযাজনেজমন্ি ইেযারি সমাধান কজর যেেজে ইনিা আল্লাহ .
CSE/IT েে এর েনয গুরুত্বপূণী িরপক আমরা সোই োরন। রকন্তু রপ্রপাজরিন রনজে আপনাজক হজে হজে
যকৌিেথ এেং স্মািী । আমাজির ১০০ রিজনর রপ্রপাজরিন প্লান টি আপনাজক একটি Efficient &
Effective রপ্রপাজরিন রনজে সাহােয করজে। ১৪ সপ্তাজহর এই রপ্রপাজরিন প্লান টি সাোজনা হজয়জছ এমন
ভাজে োজে কজর আপরন একটি চাকু রথর পািাপারিও প্রস্তুরে রনজে পারজেন।
“এই ই-েুক/রপ্ররময়াম ররজসাসী টি এর স্বত্বারধকারথ একমাত্র ©100 DAYS CHALLENGE TEAM সংরিণ কজর।“
এই ররজসাসী টি এেথি করা, রেরি করা, যিয়ার করা(যেজকান মাধযজম) সম্পূণী রনজেধ
যকান ভু ে যচাজে পরজে আমাজির োনাজনার েনয অনুজরাধ রইে। ই-েুক/রপ্ররময়াম ররজসাসী টি
আমরা রনয়রমে আপজেি করজো । পরেেথী সংস্করণ আপজেি যপজে আমাজির গ্রুজপ েজয়ন
করুন এেং রনয়রমে ক্লাস, অনুিথেন, রেস্কািজন অনিগ্রহন করুন। ধনযোি।
Basic Advance
Electrical and Engineering
Electronics Technology
আমাজির যকাজসী এনজরাে না কজরও ররজসাসী টি পড়ার েনয ধনযোি। আপনার প্ররে আহোন আমাজির গ্রুজপ রি
েজয়ন যহান। যকাজসী এনজরাে হজয় রনন আপজেটিে ররজসাসী হযান্ডজনাি/ ররজসাসী িা েুজে রনন। নেুো আপরনও
৩০০ িাকা ঋনথ হজয় র্াকজেন।
1st Gen The period of first generation: 1946-1959 Vacuum tube based.
Examples: IBM 1620, IBM 7094, CDC 1604, CDC 3600, UNIVAC 1108.
3rd Gen The period of third generation: 1965-1971 Integrated Circuit based
Examples: IBM-360 series, Honeywell-6000 series, PDP (Personal Data Processor), and IBM-
370/168.
4th Gen The period of fourth generation: 1971-1980 VLSI microprocessor based
Examples: STAR 1000, CRAY-X-MP (Super Computer), DEC 10, PDP 11, CRAY-1. This
generation of computers had the first “supercomputers”
5th Gen The period of fifth generation: 1980-onwards ULSI microprocessor based
Data center
VMWare Cloud
EnterPrise
Computing
Storage Servers
Tier 1: A Tier 1 data center has a single path for power and cooling and few, if any, redundant and
backup components. It has an expected uptime of 99.671% (28.8 hours of downtime annually).
Tier 2: A Tier 2 data center has a single path for power and cooling and some redundant and backup
components. It has an expected uptime of 99.741% (22 hours of downtime annually).
Tier 3: A Tier 3 data center has multiple paths for power and cooling and systems in place to update and
maintain it without taking it offline. It has an expected uptime of 99.982% (1.6 hours of downtime
annually).
Tier 4: A Tier 4 data center is built to be completely fault tolerant and has redundancy for every
component. It has an expected uptime of 99.995% (26.3 minutes of downtime annually).
A redundant data center architecture duplicates critical components—such as UPS systems, cooling
systems, backup generators and Networking devices—to ensure data center operations can continue even
if a component fails. There are Different redundancy model N, N+1, N+2, 2N, 2N+1.
N N The minimum capacity. N does not include any redundancy (single points of failure)
2N+1 delivers the fully fault-tolerant 2N architecture plus an extra component for an
2N+1
added layer of protection.
Cloud
Model
Deployment Service
Models Models
The cloud resources (like servers and storage) are owned and
operated by a third-party cloud service provider and delivered over
Public Cloud the internet. With a public cloud, all hardware, software, and other
supporting infrastructure are owned and managed by the cloud
provider. Such as Amazon Web Services (AWS) or Microsoft Azure.
Hybrid clouds combine both private and public cloud models for
maximum flexibility. This is a common example of hybrid cloud:
Hybrid clouds Organizations can use private cloud environments for their IT
workloads and complement the infrastructure with public cloud
resources to accommodate occasional spikes in network traffic.
Hardware
Provision or migrate any virtual machine to any physical server.
Independence
The device which responds the services for Perform dedicated task with having
1.
the client’s request is called server. enhanced features.
2. The example: FTP, Web, DNS etc. The example: Video, audio WS etc.
Operating system used in server are: Linux, Operating system used in workstation
3.
Solaris server and windows. are: Unix, Linux or Windows NT.
All the Processors regardless of their origin or type perform a basic instruction cycle that consists
of three steps named Fetch, decode and execute.
Fetching an instruction from Decoding the instruction - Executing the instruction - the CPU
memory - supplying the interpreting the instruction and then carries out the required action.
address and receiving the reading and retrieving the required Each part of the CPU is activated to
instruction from memory data from their addresses carry out the instructions.
Most modern CPUs have multiple cores 4,6,8 to up to 32 and 64. Each core is
Core Count
like a CPU. Multiple cores within a CPU can execute multiple progs parallelly.
Hyper-Threading feature allows each core on the CPU to act as 2 cores. A 4 core
Hyper-threading
CPU with hyperthreading support will appear to have 4 x 2 = 8 cores. A more
support
generic term is multi-threading. simultaneously thereby making it faster
The clock speed is measured in cycles per second (Hz). CPU with a clock speed
Processor
of 2 gigahertz (GHz) can carry out two thousand million (or two billion) cycles per
Speed/Clock Cycle
second. The higher the clock speed the faster it can process instructions.
Overclocking Overclocking is the process of increasing the boost clock speed of a CPU beyond
support the limits set or specified by the manufacturer.
Most modern CPUs have 3 Levels of caches to store data needed while executing
L Caches
program instructions. These are named L1, L2, and L3, with the capacity
(L1, L2, L3)
increasing with each level.
The memory speed, MT/s, determines the speed of data transfer between the
Memory Speed CPU and ram. 3200 MT/s, means that it can potentially performs 3200 million
data transfers per second.
Thread:
• Intel CPUs uses hyper-threading, and AMD CPUs uses simultaneous multithreading
Pipeline
CISC stands for Complex Instruction Set Computer. It is designed to minimize the number of
instructions per program, ignoring the number of cycles per instruction. The emphasis is on
building complex instructions directly into the hardware. The compiler has to do very little work to
translate a high-level language into assembly level language/machine code because the length
of the code is relatively short, so very little RAM is required to store the instructions. Some of the
CISC Processors are −VAX, AMD, Intel x86 and the System/360.
RISC CISC
The execution time of RISC is very short. The execution time of CISC is longer.
It requires multiple register sets to store the It requires a single register set to store the
instruction. instruction.
RISC has simple decoding of instruction. CISC has complex decoding of instruction.
Uses of the pipeline are simple in RISC. Uses of the pipeline are difficult in CISC.
It uses a limited number of instructions that It uses a large number of instructions that
requires less time to execute the instructions. requires more time to execute the instructions.
The program written for RISC architecture Program written for CISC architecture tends to
needs to take more space in memory. take less space in memory.
RISC architecture can be used with high-end CISC architecture can be used with low-end
applications like telecommunication, image applications like home automation, security
processing, video processing, etc. system, etc.
Example of RISC: ARM, PA-RISC, Power Examples of CISC: VAX, Motorola 68000 family,
Architecture, Alpha, AVR, ARC and the SPARC. System/360, AMD and the Intel x86 CPUs.
1. Non-Pipelined Execution-
All the instructions of a program are executed sequentially one after the other. A new instruction
executes only after the previous instruction has executed completely. This style of executing the
instructions is highly inefficient.
Example- Consider a program consisting of five instructions. In a non-pipelined
architecture, these instructions execute one after the other as-
If time taken for executing one instruction = t, then Time taken for executing n instructions = n x t
2. Pipelined Execution-
In pipelined architecture, Multiple instructions are executed parallelly. This style of executing the
instructions is highly efficient.
Instruction Pipelining- Instruction pipelining is a technique that implements a form of parallelism
called as instruction level parallelism within a single processor. A pipelined processor does not
wait until the previous instruction has executed completely. Rather, it fetches the next instruction
and begins its execution. In pipelined architecture,
• The hardware of the CPU is split up into several functional units.
• Each functional unit performs a dedicated task.
• These functional units are called as stages of the pipeline.
Phase-Time Diagram -
Phase-time diagram shows the execution of instructions in the pipelined architecture. The
following diagram shows the execution of three(A,B,C) instructions in four stage pipeline
architecture.
Cycle time = Maximum delay offered by any stage + the delay of register
Frequency of Clock
• Speed Up
• Efficiency
• Throughput
1. Speed Up- It gives an idea of “how much faster” the pipelined execution is as compared to
non-pipelined execution. It is calculated as-
Problem-01: Consider a pipeline having 4 phases with duration 60, 50, 90 and 80 ns. Given
latch delay is 10 ns. Calculate-
1) Pipeline cycle time
2) non-pipeline execution time
3) Speed up ratio
4) Pipeline time for 1000 tasks
5) Sequential time for 1000 tasks
6) Throughput
Given-
Solution- Given-
• Four stage pipeline is used
• Delay of stages = 150, 120, 160 and 140 ns
• Delay due to each register = 5 ns
• 1000 data items or instructions are processed
Cycle Time-
Cycle time = Maximum delay due to any stage + Delay due to its register
= Max {150, 120, 160, 140} + 5 ns
= 160 ns + 5 ns
= 165 ns
Pipeline Time To Process 1000 Data Items-
Pipeline time to process 1000 data items
= Time taken for 1st data item + Time taken for remaining 999 data items
= 1 x 4 clock cycles + 999 x 1 clock cycle
= 4 x cycle time + 999 x cycle time
= 4 x 165 ns + 999 x 165 ns
= 660 ns + 164835 ns
= 165495 ns
= 165.5 μs
Problem-04:
Problem-03: A non-pipelined
The stage delayssingle cycle processor
in a 4-stage operating
pipeline are 800, 500,at 100
400 MHz
and 300ispicoseconds.
converted into
Thea
synchronous pipelined processor with five stages requiring 2.5 ns, 1.5 ns, 2 ns, 1.5 ns and
first stage is replaced with a functionally equivalent design involving two stages with respective 2.5
ns respectively.
delays 600 and 350 The delay of the latches is 0.5 sec. What is the speed up of the pipeline
picoseconds.
processor for a large number
The throughput increase of the ofpipeline
instructions?
is _____%.
Non-Pipelined
Execution TimeProcessor
in 4 Stage- Pipeline- Pipelined
ExecutionProcessor -
Time in replace Stage Pipeline-
Frequency
Cycle time of the clock = 100 MHz. Cycle time
= Max time
Cycle delay=in1/stage
freq =+ 1Delay
/ (100due to its
MHz) register
= 0.01 μs =
= Max
Max delay
delay in
in stage
stage ++ Delay
Delay due
due to
to its
its register
register
= Max {800, 500, 400, 300} + 0 = Max {600, 350, 500, 400, 300} +
= Max {2.5, 1.5, 2, 1.5, 2.5} + 0.5 ns0
Execution time
= 800 picoseconds = 600ns
picoseconds
= 2.5 + 0.5 ns = 3 ns
Non-pipeline
Throughput execution time to process 1 instruction Throughput
Execution time
=1 clock cycle
Number = 0.01 μs executed
of instructions = 10 ns per unit time = Number of instructions
pipeline execution time toexecuted
process 1per unit time
instruction
= 1 instruction / 800 picoseconds = 1 instruction / 600
= 1 clock cycle = 3 nspicoseconds
Throughput
Speed up- Increase-
=
= {(Final throughput
Non-pipeline – Initial
execution timethroughput) / Initial throughput}
/ Pipeline execution time x 100
= ((1/600 -
= 10 ns / 3 ns1/800) / (1/800)) * 100
=
= 33.33 %
3.33 Ans
Time taken for 1st instruction + Time taken for Time taken for 1st instruction + Time taken for
remaining 99 instructions remaining 99 instructions
Time saved-
= Execution time in design D1 – Execution time in design D2
= 416 ns – 214 ns
= 202 ns Ans
problem-06: The 5 stages of the processor have the following latencies. Assume that
when pipelining, each pipeline stage costs 20ps extra for the registers between pipeline
stages.
1. non-pipelined processor: what is the cycle time? What is the latency of an instruction? What is the
throughput?
2. Pipelined processor: What is the cycle time? What is the latency of an instruction? What is the
throughput?
Following are the different features of the memory system that includes:
1. Location: It represents the internal or external location of the memory in a computer.
2. Capacity: External devices' storage capacity is measured in terms of bytes, whereas the
internal memory is measured with bytes or words
3. Access Methods: Memory can be accessed through four modes of memory.
a. Direct Memory Address: access data directly from the main memory.
b. Sequential Access Method: read stored data sequentially from memory.
c. Random Access Method: randomly access data from memory. opposite of SAM.
d. Associative Access Method: optimizes search performance -directly access.
4. Unit of transfer: Transfer rate of bits that can be read or write in or out of the memory
devices. The transfer rate of bits is mostly equal to the word size. The transfer rate of unit
greater than a word or may be referred to as blocks.
5. Performance: The performance of memory is majorly divided into three parts.
1. Access Time: time taken by memory devices to perform a read or write operation
2. Memory Cycle Time: Total time required to access memory block and additional
required time before starting second access.
3. Transfer rate: It describes the transfer rate of data used to transmit memory to or
from an external or internal memory device.
The access time of SRAM is low [10 ns] The access time of DRAM is high [90 ns]
It uses flip-flops to store each bit of It uses a capacitor to store each bit of
information. information.
Structure of Memory
Problem: Which is the number of address lines needed for a 4 Mbit memory chip: a) organized
as 4Mx1; b) organized as 1Mx4?
Problem: A computer has 128 MB of memory. Each word in this computer is eight bytes. How
many bits are needed to address any single word in memory?
The memory address space is 128 MB, which means 27 x 220 = 227.
However, each word is eight (23) bytes,
which means that we have 227/23 = 224 words.
This means that we need log2 (224) , or 24 bits, to address each word. Ans
A computer has 512MB of memory. Each word in this computer is 32bytes. How many bits are
needed to address any single word in memory?
This equals 512 MB / 32 = 2²4 words possible. To address all possible words
It will require log2 (224) bits = 24 bits to select a single word of memory. Ans
BIOS: A computer's basic input/output system (BIOS) is a program that's stored in nonvolatile
memory such as read-only memory (ROM) or flash memory, making it firmware. The BIOS
(sometimes called ROM BIOS) is always the first program that executes when a computer is
powered up.
User can write any type of information or program only once using the special PROM
programmer or PROM burner device; after that, the data or instruction cannot be changed or
erased.
Stored data can be erased and re-programmed only once in the EPROM memory. If we want to
erase any stored data and re-programmed it, first, we need to pass the ultraviolet light for 40
minutes to erase the data; after that, the data is re-created in EPROM.
EEPROM, the stored data can be erased and reprogrammed up to 10 thousand times, and the
data erase one byte at a time. Erase the stored data using a high voltage electrical charge and
re-programmed it.
Flash ROM:
Flash memory is a non-volatile storage memory chip that can be written or programmed in small
units called Block or Sector. Flash Memory is an EEPROM form of computer memory, and the
contents or data cannot be lost when the power source is turned off. It is also used to transfer
data between the computer and digital devices.
Read and write operations can be performed. Only Read operation can be performed.
Data can be lost in volatile memory when the Data cannot be lost in non-volatile memory
power supply is turned off. when the power supply is turned off.
Storage data requires to be refreshed in Storage data does not need to be refreshed in
RAM. ROM.
The size of the chip is bigger than the ROM The size of the chip is smaller than the RAM chip
chip to store the data. to store the same amount of data.
Type of RAM: DRAM and SRAM Type of ROM: MROM, EPROM, EEPROM
Hard Disk A hard disk is a computer's permanent storage device. Typically, it is located internally
on computer's motherboard that stores and retrieves data using one or more rigid fast rotating
disk platters inside an air-sealed casing
Floppy Disk is a secondary storage system that consisting of thin, flexible magnetic coating disks
for holding electronic data such as computer files which can store data up to 1.44 MB.
CD (Compact Disc) is an optical disk storage device, stands for Compact Disc, which can store
approximately 783 MB of data size. It uses laser light to read and write data from the CDs. CDs
are divided into three types, such as: CD-ROM (Compact Disc Read Only Memory, CD-R
(Compact Disc Recordable) CD-RW (Compact Disc Rewritable):
DVD Drive/Disc is an optical disc storage device, stands for Digital Video Display or Digital
Versatile Disc. DVD drives are divided into three types, such as DVD ROM (Read Only
Memory), DVD R (Recordable) and DVD RW (Rewritable or Erasable). The storing capacity of
data in DVD is 4.7 GB to 17GB.
Pen Drive is a portable device used to permanently store data and is also known as a USB flash
drive. It does not have any moveable part to store the data. The storing capacity of pen drives
from 64 MB to 128 GB or more.
It is known as temporary memory. Data can be It is known as a permanent memory Data cannot
access directly by the processor or CPU be accessed directly by processor or CPU.
limited storage capacity and stored data can be large storage capacity and non-volatile nature.
a volatile or non-volatile memory.
It is more costly and faster memory It is less costly and slower memory.
It required the power to retain the data in It does not require power to retain the data in
primary memory. Example: EPROM, PROM secondary memory. Example: CD, DVD, HDD
and cache memory.
HDD vs SSD
HDD uses magnetism, which allows you to store data on a rotating platter. It has a read/write
head that floats above the spinning platter for Reading and Writing of the data. The faster the
platter spins, the quicker an HDD can perform.
SSD: These are solid-state drives. It is a type of storage medium that does not have moving
parts. It lasts longer and performs better than the traditional hard disk drives.
NVMe technology utilizes the PCIe bus, instead of the SATA bus
SATA: It stands for Serial Advanced Technology Attachment. It is a 7-pin connector. It is cheap.
The speed of data transfer is high. It consumes less power. The size of the cable is small. It
comes with the hot swapping feature. External hard drives can be used with SATA.
PCIe: Peripheral component interconnects express. PCIe is also known as PCI Express. This is a
slot on the motherboard of a PC that is used to connect everything from graphics cards to solid-
state drives.
The register memory is a temporary storage area for storing and transferring the data and the
instructions to a computer. It is the smallest and fastest memory of a computer. It is a part of
computer memory located in the CPU as the form of registers. The register memory is 16, 32 and
64 bits in size. It temporarily stores data instructions and the address of the memory that is
repeatedly used to provide faster response to the CPU.
Cookies: Cookies in a system refer to the small files of data and information (that might be)
useful to the visited websites. These include passwords, used browser, visited pages and
preferences, IP address, and many more. This way, every time a user loads any website, the
browser will immediately send the cookies to the server (the user is in). This way, the website
stays aware of the previous activities of the user on the internet. This step helps the websites
display favorable ads, cut the login time, load pages faster, display relatable content, and many
more.
Whenever any program has to be executed, it is first loaded in the main memory. The portion of the
program that is mostly probably going to be executed in the near future is kept in the cache memory. This
allows CPU to access the most probable portion at a faster speed.
Whenever CPU requires any word of When the required word is not found in the CPU
memory, it is first searched in the CPU registers, it is searched in the cache memory.
registers. Now, there are two cases Now, there are two cases possible-
possible-
• If the required word is found in the cache
• If the required word is found in the CPU memory, the word is delivered to the CPU.
registers, it is read from there. This is known as Cache hit.
• If the required word is not found in the • If the required word is not found in the cache
CPU registers, Step-02 is followed. memory, Step-03 is followed. This is known
as Cache miss.
When the required word is not found in the cache memory, it is searched in the main memory. Now,
there are two cases possible-
• If the page containing the required word is found in the main memory, The page is mapped from
the main memory to the cache memory. This mapping is performed using cache mapping
techniques. Then, the required word is delivered to the CPU.
• If the page containing the required word is not found in the main memory, A page fault occurs.
The page containing the required word is mapped from the secondary memory to the main
memory. Then, the page is mapped from the main memory to the cache memory. Then, the
required word is delivered to the CPU.
If an Execution of Program registers 39 cache hits and 2 cache misses in a given timeframe,
then the CHR is 39 divided by 41, or 0.951. As a percentage, this would be a cache hit ratio of
95.1%.
This indicates that the Execution of Program was able to deliver requested data from its cache
95.1% of the time.
• Main memory is divided into equal size partitions called as blocks or frames.
• Cache memory is divided into same size as that of blocks called as lines or Words.
• During cache mapping, block of main memory is simply copied to the cache.
Formula
𝑁𝑜 𝑜𝑓 𝑏𝑖𝑡(𝑏𝑙𝑜𝑐𝑘 𝑜𝑓𝑓𝑠𝑒𝑡) = 𝑙𝑜𝑔2 (block size) [𝐵𝑙𝑜𝑐𝑘 𝑠𝑖𝑧𝑒 = 𝐹𝑟𝑎𝑚𝑒 𝑠𝑖𝑧𝑒 = 𝐿𝑖𝑛𝑒 𝑠𝑖𝑧𝑒]
Example-
Consider the following scenario-
Here,
Solution-
Given-
• Cache memory size = 16 KB
• Block size = Frame size = Line size = 256 bytes
• Main memory size = 128 KB
We consider that the memory is byte addressable.
Number of Bits in Physical Address-
We have,
Size of main memory = 128 KB = 217 bytes
Thus, No. of bits in physical address = 17 bits
Number of Bits in Block Offset-
We have,
Block size = 256 bytes = 28 bytes
Thus, Number of bits in block offset = 8 bits
Number of Bits in Tag-
Tag bit = Number of bits in physical address – Number of bits in block offset
= 17 bits – 8 bits = 9 bits
Thus, Number of bits in tag = 9 bits
Solution-
Given-
Problem 1. When the cache is 64 kilobytes in size and the size of Block/line is 8 bytes, how
many bits would be required in order to represent the lines of a 4-way set-associative memory in
cache?
Solution: Total number of lines = Size of Cache / Size of Block = 64 kilobytes / 8 bytes = 213
bytes
Thus, 13 bits are required in order to represent various lines in the cache.
The total number of bits for a set = Total number of lines / K-way = 213 bytes / 22 = 211
Thus, a total number of 11 bits are required in order to represent various sets in a cache.
Problem 2. In case there are 10 bits for a given set in a 4-way set-associative where the block
size happens to be 16 kilobytes, then the cache size would be:
Solution:
The block size = 16 kilobytes = 214
K-set associative cache size = number of sets x total number of lines per set x size of line.
Size of cache = 210 x 4 x 214 bytes = 64 megabytes
Click Join